Editing LFI Course Materials/Cohort two final projects

Jump to navigation Jump to search

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision Your text
Line 29: Line 29:
 
This is a training presentation to introduce library staff to the philosophy behind library privacy policies and teach them practical applications.
 
This is a training presentation to introduce library staff to the philosophy behind library privacy policies and teach them practical applications.
  
==== Stephanie Milberger: [https://drive.google.com/open?id=1JGZDR5O2WiYns1KQXp3Tk2d86ipfeEp Privacy Basics 101: VPN Guide] CC BY-NC-SA ====
+
==== Stephanie Milberger ====
This a printable primer on VPNs for the general public. Can be used in conjunction with TJ's video.
 
  
 
==== Ashley J. Brown: [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/LFI2/finalprojects/LFI-ashleyprojectzine.pdf SESTA/FOSTA Zine for Librarians] CC BY-NC-SA 4.0. ====
 
==== Ashley J. Brown: [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/LFI2/finalprojects/LFI-ashleyprojectzine.pdf SESTA/FOSTA Zine for Librarians] CC BY-NC-SA 4.0. ====
Line 39: Line 38:
 
==== Jonathan Hernandez Perez: [https://github.com/jonhz/LFI-/blob/master/Privacy%20and%20Censorship.pdf Poster on Privacy and Censorship] CC BY-NC-SA. ====
 
==== Jonathan Hernandez Perez: [https://github.com/jonhz/LFI-/blob/master/Privacy%20and%20Censorship.pdf Poster on Privacy and Censorship] CC BY-NC-SA. ====
  
==== Ellie Avis: [https://drive.google.com/open?id=1OO5Ker96Xl52lr6vtC4SqM65yf0JcM-z Welcome to Computers] CC BY-SA. ====
+
==== Ellie Avis ====
This a four-part class integrating digital literacy training and digital privacy basics. Week one covers computer basics and introduces open source software. Week two covers web browsing, encryption, and passwords. Week three covers email, phishing, and avoiding malware. Week four is focused on online learning and is a chance to reinforce the concepts presented in previous sessions.
 
  
 
==== Grace Riario ====
 
==== Grace Riario ====
  
==== Megan Shanholtz: [https://docs.google.com/presentation/d/104CLbpuk92Oi9g0F6yViHeM1bouIIfWUVqm2VoUJqFI/edit?usp=sharing Privacy and Security for Public Libraries] CC BY-NC-SA ====
+
==== Megan Shanholtz ====
This is a presentation on privacy and security aimed towards librarians. It contains live links, with the thought that it can be shared online afterwards as a more extensive resource.
 
  
 
==== Nicole Becwar: [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/LFI2/finalprojects/Library%20Freedom-%20Vendor%20Scorecard-%20110719.pdf Vendor privacy scorecard]; [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/LFI2/finalprojects/WhyPrivacyLicenseQ%26A-Qiana_Nicole.docx Vendor Privacy FAQ] CC BY-NC-SA ====
 
==== Nicole Becwar: [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/LFI2/finalprojects/Library%20Freedom-%20Vendor%20Scorecard-%20110719.pdf Vendor privacy scorecard]; [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/LFI2/finalprojects/WhyPrivacyLicenseQ%26A-Qiana_Nicole.docx Vendor Privacy FAQ] CC BY-NC-SA ====
In 2015, NISO brought together library staff, publishers, and software providers to create, “Consensus Principles on User’s Digital Privacy in Library, Publisher, and Software-Provider Systems” in an attempt to find common ground for library patron privacy. Based on the principles identified in the white paper, we analyzed 12 vendor privacy policies, including ProQuest, Elsevier, EBSCO, OCLC, Ex Libris, and JSTOR, vendors who were part of the core working group for the NISO white paper, to create the vendor privacy scorecard. The policies were graded against a common rubric and practices were denoted as being good privacy practices, areas of concern, or privacy practices that were incompatible with library privacy values.
 
  
 
==== Wren Kominos-Marvell: [https://github.com/wrenkominos/Stalkerware Stalkerware Training Resources]; [https://github.com/wrenkominos/PrivacyTools Privacy Tools Training]; CC BY-NC-SA ====
 
==== Wren Kominos-Marvell: [https://github.com/wrenkominos/Stalkerware Stalkerware Training Resources]; [https://github.com/wrenkominos/PrivacyTools Privacy Tools Training]; CC BY-NC-SA ====
Line 56: Line 52:
  
 
A privacy tools training for public library staff. There is a recording of the training and a powerpoint presentation. There is a flyer included for displaying at the public computers. Public outreach was done via a local public radio program. The recording of that show is included in two different filetypes.
 
A privacy tools training for public library staff. There is a recording of the training and a powerpoint presentation. There is a flyer included for displaying at the public computers. Public outreach was done via a local public radio program. The recording of that show is included in two different filetypes.
 +
 +
|-
 +
 +
==== Kristy Cooper:
 +
 +
[https://docs.google.com/document/d/1x32gxD5xAeSoj_Ydacc-QwnVK9SXgatJ-wWSsTnGf38/edit?usp=sharing Sex worker interview notes] ;
 +
[https://docs.google.com/document/d/1DAreLuv_iOrDpyWUho0R2TX46NRx-RNZnA8QKqyfyQQ/edit?usp=sharing Sex worker privacy and privilege (initial thoughts to be turned into a longer article and/or integrated into my Stripper Librarian book)] CC BY-NC-SA ====
 +
  
 
==== Symphony Bruce: [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/LFI2/finalprojects/Library%20Freedom%20Guide%20to%20Harassment-%20111519.pdf Guide to Protecting Yourself From Online Harassment]CC BY-NC ====
 
==== Symphony Bruce: [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/LFI2/finalprojects/Library%20Freedom%20Guide%20to%20Harassment-%20111519.pdf Guide to Protecting Yourself From Online Harassment]CC BY-NC ====
Line 88: Line 92:
 
==== Kimberly Trinh-Sy: [https://drive.google.com/file/d/1GOqfCddy-c2lsbsIG4228MV5V71OQK-o/view?usp=sharing Facial Recognition Poster & Passive Program] CC BY-NC-SA ====
 
==== Kimberly Trinh-Sy: [https://drive.google.com/file/d/1GOqfCddy-c2lsbsIG4228MV5V71OQK-o/view?usp=sharing Facial Recognition Poster & Passive Program] CC BY-NC-SA ====
  
This is a poster that can be used in coordination with a book display and/or passive program.  An accompanying passive program might include a collection of props (hats, sunglasses, masks, etc.) that could be worn to potentially confuse facial recognition technology.  Library patrons would be encouraged to try on a variety of props, then photograph themselves to see if their phone's photo or social media apps can identify them.  Of course, patrons are encouraged to delete photos immediately afterward, in order to protect their privacy!
+
==== Leigh Ann Hamel ====
 
 
==== Leigh Ann Hamel [https://drive.google.com/file/d/1HW_fH916YtPcoEyNM2VQMKCXjkYkqj5X/view?usp=sharing Protect Yourself From Abuse poster] CC BY-NC-SA ====
 
 
 
This is a poster meant to help at risk people recognise some signs of abuse and social engineering, as well as pratical tips for keeping their information safe in a digital world.
 
  
 
==== Julia Wiswell: [https://drive.google.com/drive/folders/11nJUTeoF-byvbnH_veyBv9-tML1rjq5G?usp=sharing  Staff Training Micro Modules] CC BY-NC-SA ====
 
==== Julia Wiswell: [https://drive.google.com/drive/folders/11nJUTeoF-byvbnH_veyBv9-tML1rjq5G?usp=sharing  Staff Training Micro Modules] CC BY-NC-SA ====
Line 103: Line 103:
  
 
This work is licensed under a Creative Commons CC-BY License 4.0.
 
This work is licensed under a Creative Commons CC-BY License 4.0.
 
==== Kristy Cooper ====
 
 
[https://docs.google.com/document/d/1x32gxD5xAeSoj_Ydacc-QwnVK9SXgatJ-wWSsTnGf38/edit?usp=sharing Sex worker interview notes];
 
[https://docs.google.com/document/d/1DAreLuv_iOrDpyWUho0R2TX46NRx-RNZnA8QKqyfyQQ/edit?usp=sharing Sex worker privacy and privilege (initial thoughts to be turned into a longer article and/or integrated into my Stripper Librarian book)] CC BY-NC-SA
 

Please note that all contributions to Library Freedom Wiki Page may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see Library Freedom Wiki Page:Copyrights for details). Do not submit copyrighted work without permission!

To protect the wiki against automated edit spam, we kindly ask you to solve the following CAPTCHA:

Cancel Editing help (opens in new window)